Search Results for: Host-based Intrusion Detection

Presentation Transcript: Vulnerability Scanning and Compliance
In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.

Dell SecureWorks

2023 Threat Hunting Report
The problem isn't malware — it's adversaries. To stop these adversaries, security teams must understand how they operate. In the 2023 Threat Hunting Report, CrowdStrike's Counter Adversary Operations team exposes the latest adversary tradecraft and provides knowledge and insights to help stop breaches.

TOPICS: .NET
CrowdStrike

Swiss Army Knife Security? How to Vet Integrated Tool Sets
In this issue of Information Security magazine, we look at the changing delivery models for cybersecurity tools as more vendors offer multi-tool platforms and services. Let us help you make sense of it all with advice on tool consolidation.

TechTarget Security

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.

Dell SecureWorks

IDS vs. IPS
When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.

Sourcefire

Intrusion Detection and Protection: From Business Problem to Technical Solution
Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.

TechTarget Security

Secure Connectivity for Devices and Users at the Network Edge
Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.

TOPICS: .NET
Cradlepoint

Your Hybrid Infrastructure is Under Attack
Hybrid infrastructures are under attack, warns Palo Alto Networks in this white paper. To deepen your understanding of the state of hybrid security, and to discover how you can augment your security posture, tap into the 13-page paper.

TOPICS: .NET
Palo Alto Networks

Intrusion Detection and Prevention: RFP Technology Decisions
To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.

TechTarget Security

AlienVault®: What You SIEM is What You Get
A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

AT&T Cybersecurity